Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?

Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?A . NIC teaming B. Load balancer C. RAID array D. PDUsView AnswerAnswer: A

March 15, 2023 No Comments READ MORE +

Which of the following needs to be configured on the server?

A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?A . Load balancing B....

March 15, 2023 No Comments READ MORE +

Which of the following attacks did the network administrator prevent?

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?A . Evil twin B. Tailgating C. Piggybacking D. Shoulder surfingView AnswerAnswer: B

March 15, 2023 No Comments READ MORE +

Which of the following would be the MOST appropriate way to enable secure remote printing?

A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall. Which of the following would be the MOST appropriate way to enable secure remote printing?A . SSH...

March 15, 2023 No Comments READ MORE +

Which of the following switch features will MOST likely be used to assist with this task?

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?A . Spanning Tree Protocol B. Neighbor Discovery Protocol C. Link Aggregation Control...

March 15, 2023 No Comments READ MORE +

Which of the following can the administrator do to MOST easily mitigate this issue?

A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?A . Reduce the wireless power levels B. Adjust the wireless channels C. Enable wireless...

March 14, 2023 No Comments READ MORE +

Which of the following allows the enforcement of this policy?

Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?A . Motion detection B. Access control vestibules C. Smart lockers D. CamerasView AnswerAnswer: B Explanation: The most...

March 14, 2023 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT SIMULATION You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters: The SSIDs need to be configured as CorpNet with a key of S3cr3t! The wireless...

March 14, 2023 No Comments READ MORE +

Which of the following is the number of additional network connections needed?

An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology. Which of the following is the number of additional network connections needed?A . 5 B. 7 C. 10 D. 15View AnswerAnswer: A

March 14, 2023 No Comments READ MORE +

Which of the following should a network security administrator recommend to assist with detecting these activities?

A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?A . Implement file integrity monitoring. B. Change the default credentials....

March 14, 2023 No Comments READ MORE +